Quantcast
Channel: Tech Insurance Small Business Center - Online LiabilityTech Insurance Small Business Center0.0000000.000000
Browsing all 91 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article


Image may be NSFW.
Clik here to view.

Will CISPA Make Cyber Risk Insurance Obsolete?

In 2012, the U.S. House of Representatives passed a bill called the Cyber Intelligence Sharing and Protection Act (CISPA). Designed to improve digital security, the bill has proven controversial...

View Article


Image may be NSFW.
Clik here to view.

Does the Bitcoin Model Offer the Future of Technology Insurance?

Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...

View Article

Image may be NSFW.
Clik here to view.

Gmail Just Got Safer (But You Could Still Be Sued)

According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...

View Article

Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article


Image may be NSFW.
Clik here to view.

The Next Generation of Business Data Breach: IP Theft

What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...

View Article

Image may be NSFW.
Clik here to view.

Survey: Most IT Privacy Policy Templates Woefully Insufficient

A survey published this month by DataGuidance, a global provider of data compliance resources, shows a dismal state of IT privacy policies for online companies. In fact, the survey found that 23...

View Article

Image may be NSFW.
Clik here to view.

Does the Bitcoin Model Offer the Future of Technology Insurance?

Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...

View Article


Image may be NSFW.
Clik here to view.

Gmail Just Got Safer (But You Could Still Be Sued)

According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...

View Article


Image may be NSFW.
Clik here to view.

New Security Flaws in Oracle Products Prove IT Contractors Are Always at Risk

According to an article on Kaspersky’s Threatpost.com, security researchers became upset with Oracle's slow efforts to update major security flaws in its Java cloud services and decided to publicly...

View Article

Image may be NSFW.
Clik here to view.

Personal Data Theft Up 82% in the Last 6 Months

According to a Pew Research Center survey conducted in January, nearly one in five Americans reported that they have had private information (such as such as social security and credit card numbers)...

View Article

Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article

Image may be NSFW.
Clik here to view.

The Next Generation of Business Data Breach: IP Theft

What is IP theft? It's the stealing of intellectual property, designs, patents, code, and other intangible assets. IT theft is becoming more and more common and costly – and even small IT firms can end...

View Article


Image may be NSFW.
Clik here to view.

Web Host Liabilities: How Hackers Can Shut Down Your Clients’ Website

Many of your clients use web hosts and kits (like those offered with WordPress), which could expose your clients to data breaches and downtime – and ultimately lead to a lawsuit filed against your...

View Article

Image may be NSFW.
Clik here to view.

Survey: Most IT Privacy Policy Templates Woefully Insufficient

A survey published this month by DataGuidance, a global provider of data compliance resources, shows a dismal state of IT privacy policies for online companies. In fact, the survey found that 23...

View Article


Image may be NSFW.
Clik here to view.

Does the Bitcoin Model Offer the Future of Technology Insurance?

Since Mt. Gox, Poloniex, and other Bitcoin exchanges (and mobile software) were hacked, developers have increasing concerns about digital security and data breach lawsuits. Bitcoins can be a polarizing...

View Article

Image may be NSFW.
Clik here to view.

Gmail Just Got Safer (But You Could Still Be Sued)

According to the corporate law magazine InsideCouncil, Google has increased its Gmail security standards in order to ease customer concern and provide a more secure email platform to companies that...

View Article


Image may be NSFW.
Clik here to view.

New Security Flaws in Oracle Products Prove IT Contractors Are Always at Risk

According to an article on Kaspersky’s Threatpost.com, security researchers became upset with Oracle's slow efforts to update major security flaws in its Java cloud services and decided to publicly...

View Article

Image may be NSFW.
Clik here to view.

Personal Data Theft Up 82% in the Last 6 Months

According to a Pew Research Center survey conducted in January, nearly one in five Americans reported that they have had private information (such as such as social security and credit card numbers)...

View Article

Image may be NSFW.
Clik here to view.

What IT Businesses Need to Know about the Future of Identity Theft, Data...

While you might assume that the Target data breach was caused by a coordinated and sophisticated malware attack, the truth is much more frightening.SecurityWeek.com profiles MacAfee's investigation of...

View Article
Browsing all 91 articles
Browse latest View live